Pages that link to "Item:Q3563833"
From MaRDI portal
The following pages link to Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases (Q3563833):
Displaying 33 items.
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Classical leakage resilience from fault-tolerant quantum computation (Q2010581) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Adaptive extractors and their application to leakage resilient secret sharing (Q2129011) (← links)
- A group identification protocol with leakage resilience of secret sharing scheme (Q2173730) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Efficient Leakage Resilient Circuit Compilers (Q2790050) (← links)
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice (Q2794525) (← links)
- Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits (Q2799088) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Polynomial Evaluation and Side Channel Analysis (Q2803637) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order (Q2975799) (← links)
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (Q3012821) (← links)
- Compositional Synthesis of Leakage Resilient Programs (Q3304821) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (Q3448807) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- Impossibility of Black-Box Simulation Against Leakage Attacks (Q3457063) (← links)
- A Leakage Resilient MAC (Q3460113) (← links)
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage (Q3460114) (← links)
- Interleaved Group Products (Q4634030) (← links)
- On the Connection between Leakage Tolerance and Adaptive Security (Q4916027) (← links)
- Fully Leakage-Resilient Codes (Q5738793) (← links)
- Unconditionally secure computation against low-complexity leakage (Q5918097) (← links)
- On the local leakage resilience of linear secret sharing schemes (Q5918308) (← links)
- Correction to: ``Unconditionally secure computation against low-complexity leakage'' (Q5925544) (← links)